Sciweavers

5843 search results - page 49 / 1169
» Software Security in Practice
Sort
View
SOFTWARE
1998
13 years 7 months ago
Scenarios in System Development: Current Practice
Klaus Weidenhaupt, Klaus Pohl, Matthias Jarke, Pet...
XPU
2010
Springer
13 years 6 months ago
Product and Release Planning Practices for Extreme Programming
Gert van Valkenhoef, Tommi Tervonen, Bert de Brock...
COMPSEC
2002
92views more  COMPSEC 2002»
13 years 7 months ago
A practical key management scheme for access control in a user hierarchy
In a user hierarchy we say that a security class is subordinate to another security class if the former has a lower security privilege than the latter. To implement such a hierarc...
Sheng Zhong
CCS
2008
ACM
13 years 9 months ago
Avoiding timing channels in fixed-priority schedulers
A practically feasible modification to fixed-priority schedulers allows to avoid timing channels despite threads having access to precise clocks. This modification is rather simpl...
Marcus Völp, Claude-Joachim Hamann, Hermann H...
CCS
2010
ACM
13 years 8 months ago
Practical leakage-resilient identity-based encryption from simple assumptions
We provide new constructions of Leakage-Resilient IdentityBased Encryption systems (IBE) in the Standard model. We apply a hash proof technique in the existing IBE schemes of Bone...
Sherman S. M. Chow, Yevgeniy Dodis, Yannis Rousela...